Browse Definitions by Alphabet
- N+1 UPS - N+1, also called parallel redundancy, is a safeguard to ensure that an uninterruptible power supply (UPS)system is always available.
- N_Port ID virtualization (NPIV) - N_Port ID virtualization (NPIV) is a Fibre Channel (FC) standard that makes it possible to create multiple virtual ports on a single physical node port (N_Port), with each virtual port appearing as a unique entity to the FC network.
- NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
- Nagios - Nagios is an open source IT system monitoring tool.
- named entity - In data mining, a named entity is a phrase that clearly identifies one item from a set of other items that have similar attributes.
- named entity recognition (NER) - Named entity recognition (NER) is a natural language processing (NLP) method that extracts information from text.
- NAND flash memory - NAND flash memory is a type of non-volatile storage technology that does not require power to retain data.
- NAND flash wear-out - NAND flash wear-out is the breakdown of the oxide layer within the floating gate transistors of NAND flash memory.
- nanosecond (ns or nsec) - A nanosecond (ns or nsec) is one-billionth (10-9) of a second.
- narrowband IoT (NB-IoT) - Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) protocol that uses low-power wide area network (LPWAN) technology.
- NAS gateway - NAS gateway is a NAS (network-attached storage) system in which the storage media are externally attached, typically over a Fibre Channel interface.
- national identity card - A national identity card is a portable document, typically a plasticized card with digitally embedded information, that is used to verify aspects of a person's identity.
- national provider identifier (NPI) - A national provider identifier (NPI) is a unique ten-digit identification number required by the Health Insurance Portability and Accountability Act (HIPAA) for covered healthcare providers in the United States.
- National Security Agency (NSA) - The National Security Agency (NSA) is a federal government intelligence agency that is part of the United States Department of Defense and is managed under the authority of the director of national intelligence (DNI).
- native app - A native application is a software program developers build for use on a particular platform or device.
- native code - Native code is binary data compiled to run on a processor, such as an Intel x86-class processor.
- natural disaster recovery - Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.
- natural language query - A natural language query is input that consists solely of terms or phrases spoken normally or entered as they might be spoken, without any non-language characters, such as the plus symbol or the asterisk, and without any special format or alteration of syntax.
- natural number - A natural number is a number that occurs commonly and obviously in nature.
- natural user interface (NUI) - A natural user interface -- or NUI -- is an interface that is designed to feel as natural as possible.
- NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that enables existing twisted-pair copper cabling to exceed the cable's specified limit of 1 gigabit per second (Gbps) for distances of up to 100 meters.
- NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
- NDIS (Network Driver Interface Specification) - Network Driver Interface Specification (NDIS) is a Microsoft Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other.
- near-end crosstalk (NEXT) - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
- near-field communication (NFC) - Near-field communication (NFC) is a short-range wireless connectivity technology that uses magnetic field induction to enable communication between devices when they're touched together or brought within a few centimeters of each other.
- nearline storage - Nearline storage is the on-site storage of data on removable media.
- nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.
- needs assessment - A needs assessment is a systematic process that examines what criteria must be met in order to reach a desired outcome.
- negative float (negative slack) - Negative float, also known as negative slack, is a common concept in project management that refers to the amount of time that must be saved to complete a project on time.
- neighborhood electric vehicle (NEV) - A neighborhood electric vehicle (NEV) is a type of battery-electric vehicle that is capable of traveling at a maximum speed of 25 mph and which has a maximum loaded weight of 3,000 lbs.
- neobank - A neobank is a type of fintech that offers direct banking services to individuals and organizations, without traditional physical branches.
- Nessus - Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources.
- Nest Labs - Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.
- net neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
- net price - The net price is the value at which a product or service is sold after all taxes and other costs are added and all discounts subtracted.
- Net Promoter Score (NPS) - Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or services.
- net zero - Net zero refers to a state in which all human-caused greenhouse gas emissions are counterbalanced so humanity no longer adds carbon to the atmosphere.
- NetApp Data Fabric - The products and services that compose NetApp’s Data Fabric are designed to provide customers with the agility they need to quickly and efficiently move data to and from the cloud.
- NetApp SolidFire - NetApp SolidFire is a business division of NetApp Inc.
- NetBeans - NetBeans is a Java-based integrated development environment (IDE).
- NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
- NetFlow - NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.
- netizen - A netizen is a person who uses the internet, especially as a forum, for the expression of views and participation in political society.
- Netscape - Netscape Communications Corporation ("Netscape") was a computer services company best known for its web browser, Navigator.
- NetSuite - NetSuite is a business technology vendor based in San Mateo, California.
- network access control (NAC) - Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.
- Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
- network analytics - Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.
- network analyzer (protocol analyzer or packet analyzer) - A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.
- Network as a Service (NaaS) - Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.
- network assurance - Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.
- network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
- network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
- Network Configuration Protocol (NETCONF) - The Network Configuration Protocol (NETCONF) is an Internet Engineering Task Force (IETF) network management protocol that provides a secure mechanism for installing, manipulating and deleting the configuration data on a network device such as a firewall, router or switch.
- network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
- Network Data Management Protocol (NDMP) - Network Data Management Protocol (NDMP) is an open protocol to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
- network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or humanmade catastrophe.
- network downtime - Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.
- network drive - A network drive is a shared storage device on a local area network (LAN) within a business or home.
- network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
- network fabric - 'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.
- Network File System (NFS) - Network File System (NFS) is a networking protocol for distributed file sharing.
- network functions virtualization (NFV) - Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.
- network hub - A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
- network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.
- network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
- Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
- network load balancing (NLB) - Network load balancing (NLB) is a feature in multiple versions of the Microsoft Windows Server operating system (OS), Amazon Web Services (AWS) and other cloud service providers that distribute network traffic among multiple servers or virtual machines (VMs) within a cluster to avoid overloading any one host and improve performance.
- network management - A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.
- network management system - A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
- network monitoring - Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
- network node - A computer network is a system of computers and computing devices that are connected via communication links.
- network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that's designed primarily to support workstations, PCs and, in some instances, older terminals that are connected on a local area network (LAN).
- network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
- network orchestration - Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.
- network packet - A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a packet-switched network, such as the internet.
- network performance monitoring (NPM) - Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.
- network protocol - A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.
- network security - Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.
- network segmentation - Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network.
- network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
- network slicing - Network slicing is a technique that creates multiple virtual networks on top of a shared physical network to provide greater flexibility in the use and allocation of network resources.
- network switch - A network switch connects devices in a network to each other, enabling them to talk by exchanging data packets.
- Network Time Protocol (NTP) - Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.
- network topology - A network topology is the physical and logical arrangement of nodes and connections in a network.
- network traffic - Network traffic is the amount of data that moves across a network during any given time.
- network visibility - Network visibility is an awareness of the components and data within an enterprise computer network.
- network vulnerability scanning - Network vulnerability scanning is the process of inspecting and reporting potential vulnerabilities and security loopholes on a computer, network, web application or other device, including firewalls, switches, routers and wireless access points.
- networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
- neural net processor - A neural net processor is a central processing unit (CPU) that holds the modeled workings of how a human brain operates on a single chip.
- neural radiance field (NeRF) - Neural radiance fields (NeRF) are a technique that generates 3D representations of an object or scene from 2D images by using advanced machine learning.
- neuro-symbolic AI - Neuro-symbolic AI combines neural networks with rules-based symbolic processing techniques to improve artificial intelligence systems' accuracy, explainability and precision.
- neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically monitoring brainwave activity, eye tracking and skin response.
- neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
- neurosynaptic chip - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that is designed to function more like a biological brain than a typical central processing unit (CPU).
- neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
- newsfeed - A news feed (newsfeed) is list of newly published content on a website.
- newsgroup - A newsgroup is an online discussion forum where users can post messages, exchange ideas and read the comments of others.
- Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
- next-generation firewall (NGFW) - A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software.